Pro+ Content/Storage magazine

Access your Pro+ Content below.

Log files grow unabated

COMPANIES THAT HAVE turned on logging report that logs are growing astronomically, with no end in sight. "I know of one aerospace company that was generating 1TB per week of logs," says Scott Ruple, VP of marketing at Packet- Motion, which makes the PacketSentry traffic analysis appliance. "That's a lot of logs." Adding insult to injury, most logs aren't that relevant from a compliance standpoint, says Ruple. Whereas the PacketSentry appliance collects information such as who opened a file at what time, other logs might also collect data like server heartbeat, CPU temperature and fan speed. "It's useful if you're looking for a hardware failure, but not if you're just trying to document the traffic on the network by your users," he says. By contrast, PacketSentry data consumes one-tenth the space of server logging. Furthermore, the logs are stored on a standalone SQL database, explains Ruple, so they don't take up precious space on the app servers. --Alex Barrett

Access this Pro+ Content for Free!

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features
in this issue

Based on the familiar TCP/IP networking protocol, iSCSI arrays are easy to implement and manage, and cheaper than Fibre Channel (FC)-based systems. They're also becoming a popular alternative to NAS and DAS for SMBs and remote office locations.

We profile five companies that have deployed, or are currently testing, storage virtualization and analyze their implementation experiences. The storage pros behind these efforts tell us how the products they chose are working in their production environments.

The most common shortcoming of a data classification project is the perception that it can be completed through technical analysis at the storage layer without engaging business users. While discovering and analyzing storage is part of the process, good classification requires engaging business users or their IT representatives.

Disk is increasingly a key part of the backup process, and many companies are taking the virtual tape library (VTL) route to disk-based backup. But all VTLs aren't the same. Find out the key differences among VTL products, and how they might work in your shop.

Policy-based storage management can automate the data recovery process. But you need to know what types of policies various products support, where the policy manager resides and what it's capable of doing.

This first of a three-part series on data migration products focuses on host-level data migration products. Data migration apps can automate, centralize and simplify data migrations while ensuring data integrity.

Columns
in this issue

E-mail archiving gets a lot of the attention these days, but databases shouldn't be overlooked. Database administrators end up managing old and unchanging data within their production databases, so backups are constantly protecting data that hasn't changed.

Storage Bin: In the last year, 91% of large corporations have been through an electronic discovery request. Thirty-three percent of these companies go through one or more requests per month, while 66% of midmarket companies have the same issue. And more than 50% of the time, the requests aren't satisfied.

The cost of each gigabyte of storage is declining rapidly in every segment of the market. Enterprise storage today costs what desktop storage did less than a decade ago. So why are overall costs increasing?